Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2021-10-04 18:15
Updated : 2023-11-07 03:35
NVD link : CVE-2021-32672
Mitre link : CVE-2021-32672
CVE.ORG link : CVE-2021-32672
JSON object : View
Products Affected
oracle
- communications_operations_monitor
fedoraproject
- fedora
redhat
- enterprise_linux
- software_collections
netapp
- management_services_for_netapp_hci
- management_services_for_element_software
debian
- debian_linux
redis
- redis
CWE
CWE-125
Out-of-bounds Read